Search
Now showing items 1-7 of 7
Kryptografické útoky na TLS protokol
Crytographic attacks on TLS protocol
bachelor thesis (DEFENDED)
Advisor: Tůma, Jiří
Date Issued: 2019
Date of defense: 19. 06. 2019
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Cílem této práce je seznámit čtenáře s protokolem TLS (dříve SSL) a vybra- nými útoky na tento protokol. V první části práce si zavedeme nezbytné kryp- tografické definice použité v následujících kapitolách. V druhé části ...
The aim of this work is to introduce the reader to the protocol TLS and a few selected attacks against the protocol. In the first part we will define the necessary cryptographic definitions used in the following chapters. ...
The aim of this work is to introduce the reader to the protocol TLS and a few selected attacks against the protocol. In the first part we will define the necessary cryptographic definitions used in the following chapters. ...
Cube Attacks
Krychlové útoky
bachelor thesis (DEFENDED)
Advisor: Hojsík, Michal
Date Issued: 2014
Date of defense: 04. 09. 2014
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Na základě Kubického útoku od Itai Dinura a Adi Shamira a další, ve své podstatě podobné, metody jsme navrhli novou techniku linearizace polynomů, která se ukázala být silnější, než samotný Kubický útok. Navíc uvádíme ...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method we devised a new polynomial linearisation technique, which proved to be more powerful, than the Cube Attack alone. Moreover, ...
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method we devised a new polynomial linearisation technique, which proved to be more powerful, than the Cube Attack alone. Moreover, ...
Triangulační algoritmus pro systémy nelineárních rovnic
Triangulation algorithm for non-linear equation systems
bachelor thesis (DEFENDED)
Advisor: Hojsík, Michal
Date Issued: 2012
Date of defense: 05. 09. 2012
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Tato práce se zabývá triangulačním algoritmem a jeho využitím v kryptoanalýze. Uvedeme si definici soustavy nelineárních rovnic, na kterou můžeme aplikovat trian. alg., a objasníme si co je výstupem trian. alg. Ukážeme si ...
The topic of this thesis is a triangulation algorithm and its use in cryptanalysis. First of all we will define a non-linear equation system on which we can apply triangulation algorithm and we will explain what its output ...
The topic of this thesis is a triangulation algorithm and its use in cryptanalysis. First of all we will define a non-linear equation system on which we can apply triangulation algorithm and we will explain what its output ...
Time-memory tradeoff útoky
Time-memory tradeoff útoky
bachelor thesis (DEFENDED)
Advisor: Hojsík, Michal
Date Issued: 2012
Date of defense: 21. 06. 2012
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Martin Hellman popsal první time-memory tradeoff útok na blokové šifry. Jedná se o útok s volbou otevřeného textu, ve kterém útočník předpočítá velké množství dat k jedné blokové šifře a pak jej může opakovaně využít k ...
Martin Hellman proposed the first time-memory tradeoff attack on block ciphers. It is a chosen plaintext attack, in which the attacker precomputes a large amount of data for some block cipher and can then use it repeatedly ...
Martin Hellman proposed the first time-memory tradeoff attack on block ciphers. It is a chosen plaintext attack, in which the attacker precomputes a large amount of data for some block cipher and can then use it repeatedly ...
Cryptoanalysis of a Post-quantum Cryptography Algorithm
Kryptoanalýza algoritmu post-kvantové kryptografie
diploma thesis (DEFENDED)
Advisor: Hojsík, Michal
Date Issued: 2020
Date of defense: 24. 06. 2020
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Národní institut standardů a technologie (NIST) v současnosti řídí standardizační proces pro postkvantové kryptografické primitivy. V závislosti na stavebních blocích šif- rovacích algoritmů je rozdělujeme do pěti kategorií. ...
National Institute of Standards and Technology (NIST) is currently running a stan- dardization process for a post-quantum cryptography primitives. Depending on the al- gorithms building blocks these primitives can be divided ...
National Institute of Standards and Technology (NIST) is currently running a stan- dardization process for a post-quantum cryptography primitives. Depending on the al- gorithms building blocks these primitives can be divided ...
Aplikace Gröbnerových bází v kryptografii
Applications of Gröbner bases in cryptography
diploma thesis (DEFENDED)
Advisor: Šťovíček, Jan
Date Issued: 2011
Date of defense: 19. 09. 2011
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Název práce: Aplikace Gröbnerových bází v kryptografii Autor: Aleš Fuchs Katedra: Katedra algebry Vedoucí diplomové práce: Mgr. Jan Št'ovíček Ph.D., Katedra algebry Abstrakt: V této práci studujeme přípustná uspořádání a ...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Algebra Supervisor: Mgr. Jan Št'ovíček Ph.D., Department of Algebra Abstract: In the present paper we study admissible orders ...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Algebra Supervisor: Mgr. Jan Št'ovíček Ph.D., Department of Algebra Abstract: In the present paper we study admissible orders ...
Analýza voice over IP protokolů
Analysis of voice over IP protocols
diploma thesis (DEFENDED)
Advisor: El Bashir, Robert
Date Issued: 2012
Date of defense: 20. 09. 2012
Faculty / Institute: Matematicko-fyzikální fakulta / Faculty of Mathematics and Physics
Abstract: Předkládaná práce se zabývá analýzou implementace a protokolu aplikace Skype. Zanalyzujeme několik verzí klientů a odvodíme fungování celého protokolu. Uvádíme podrobnosti všech kryptografických primitiv používaných Skype ...
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details ...
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details ...